User-Managed Access (UMA) is an award-winning OAuth-based protocol designed to give an individual a unified control point for authorizing who and what can get access to their digital data, content, and services, no matter where all those things live. Read the specs, join the group, check out the implementations, follow us on Twitter, like us on Facebook, get involved!

14 Mar '19: Congratulations and thanks to Tim Reiniger, who has been re-elected as our Legal Editor for another annual term! We are currently working on another UMA Business Model deliverable, so stay tuned for more about this important work.

22 Feb '19: Don't miss the latest updates to our Implementations page, which include a new implementation from IDENTOS.

18 Jul '18: At the Identiverse conference in Boston, Mike Schwartz and Eve Maler presented an UMA 2.0 Deep Dive masterclass, including two walkthroughs of implementations. Check out the slides and video.

24 May '18: At the EIC18 conference in Munich, Eve Maler presented Leveraging UMA's Power for Compliance and User Control, which reflected the current state of the group's work on its business model. See her presentation here.

2 Mar '18: Our Legal subgroup has produced its first draft report: A Proposed Licensing Model for User-Managed Access (or, "How the UMA protocol enables a license-based model for controlling access rights to personal digital assets"). This paper is intended for professionals in the areas of law, privacy, risk, compliance, security policy, and business policy, particularly those responsible for building and running UMA-enabled services. Much more to come in this area. Want to get involved? Join us!